Wenn herkömmliche Cyberangriffe an ihre Grenzen stoßen, greifen Hacker auf Social Engineering zurück. Durch die gezielte Manipulation von Mitarbeitern entstehen jährlich Schäden in Milliardenhöhe. Dabei können IT-Manager bereits mit einfachen Methoden das Risiko minimieren.
Quelle: Sicherheitslücke Mensch
The Drivetrain Approach: A four-step process for building data products.
Quelle: Designing great data products
For many of us the term data breach conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate the more likely we are to shift focus from outsider hackers to insider threats.
Quelle: Data Breach by Insiders: Three Key Steps to Keep Your Company Out of the Headlines
IT security professionals will tell you that the bulk of spending on cybersecurity in large organizations in recent years has been toward perimeter tools like firewalls. And yet the relentless pace of major data breaches has shown no signs of letting up.
Quelle: Can User Behavior Analytics Do a Better Job of Protecting Your Organization’s Data?
Online scams targeting credit unions and other financial institutions are evolving into social engineering.
Quelle: Social Engineering Scams Evolve & Threaten Financial Institutions
Mike McKee, CEO OF ObserveIT, lists some tips to help organizations quickly jump on any irregularities that come from within your company’s network.
Quelle: How to eliminate insider threats
Value the employee, and they’ll understand your cybersecurity awareness
Quelle: Value the employee, and they’ll understand your awareness